Established in the region for 40 years, PwC has around 8,000 people in 12 countries across the region: Bahrain, Egypt, Iraq, Jordan, Kuwait, Lebanon, Libya, Oman, the Palestinian territories, Qatar, Saudi Arabia and the United Arab Emirates.
Our regional team operates across the Middle East bringing international experience delivered within the context of the region and its culture. We can bring the collective knowledge and experience of more than 328,000 people across the entire global PwC network in advisory, assurance and tax to help you find the value you are looking for.
Internal Firm Services
Not Applicable
IFS - Information Technology (IT)
Manager
Job Description & Summary
A career in Information Technology, within Internal Firm Services, will provide you with the opportunity to support our core business functions by deploying applications that enable our people to work more efficiently and deliver the highest levels of service to our clients. Our Information Technology Generalist - Practice Support team focuses on managing the design and implementation of technology infrastructure within PwC, developing and enhancing internal applications, and providing technology tools that help create a competitive advantage for PwC to drive strategic business growth.
A Cyber Security Manager specializing in Vulnerability Management plays a crucial role in safeguarding an organization's information systems by identifying, assessing, and mitigating vulnerabilities within the network, software, and hardware.
Here is a detailed job description for such a position: Position: Cyber Security Manager - Vulnerability Management Job Summary: The Cyber Security Manager - Vulnerability Management is responsible for leading the organization's efforts to assess, prioritize, and remediate vulnerabilities that pose a risk to the company's information assets. This role involves managing a team of security analysts, coordinating vulnerability assessments, overseeing the implementation of security measures, and ensuring compliance with relevant security standards and regulations.
Vulnerability Assessment and Management: Develop and maintain a comprehensive vulnerability management program, including regular vulnerability assessments, mitigate potential security threats. Team Leadership: Manage and lead a team of Vulnerability specialists in performing security assessments, analyzing vulnerability data, and executing remediation actions. Policy and Procedure Development: Develop, implement, and maintain policies, procedures, and tools for vulnerability management and response. Ensure that these policies align with industry best practices. Remediation Coordination: Work closely with IT and development teams to prioritize and coordinate remediation efforts, ensuring timely patching or mitigation of identified vulnerabilities. Threat Intelligence Integration: Adjust vulnerability management strategies based on current threat landscapes. Compliance and Reporting: Ensure compliance with legal, regulatory, and internal policy requirements related to cybersecurity. Prepare and present reports to senior management on vulnerability findings, remediation efforts, and program effectiveness. Technology and Process Improvement: Continuously evaluate and improve vulnerability management tools, technologies, and processes to enhance the organization's security posture. Required Skills and Qualifications: Bachelor’s degree in Computer Science, Information Security, or a related field. Advanced degrees and certifications (e.g., CISSP, CISM, CEH) preferred. Proven experience in cybersecurity, particularly in vulnerability management, risk assessment, and threat analysis. Strong leadership and team management skills, with the ability to motivate and guide a team of security professionals. Expert knowledge of security principles, techniques, and technologies, as well as experience with vulnerability scanning tools and penetration testing methodologies. Excellent communication skills, both written and verbal, with the ability to present complex security issues to a non-technical audience. Data analytics & visualization Knowledge of CVSS vulnerability scoring system Detail oriented, organized, methodical, follow up skills with an analytical thought process
Education
(if blank, degree and/or field of study not specified)
Degrees/Field of Study required:
Degrees/Field of Study preferred:
Certifications
(if blank, certifications not specified)
Desired Languages
(If blank, desired languages not specified)
Available for Work Visa Sponsorship?
Government Clearance Required?